Movatterモバイル変換


[0]ホーム

URL:


US20120023566A1 - Fraudulent Page Detection - Google Patents

Fraudulent Page Detection
Download PDF

Info

Publication number
US20120023566A1
US20120023566A1US12/989,006US98900609AUS2012023566A1US 20120023566 A1US20120023566 A1US 20120023566A1US 98900609 AUS98900609 AUS 98900609AUS 2012023566 A1US2012023566 A1US 2012023566A1
Authority
US
United States
Prior art keywords
page
token
fraudulent
probability
pages
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/989,006
Other versions
US8806622B2 (en
Inventor
David Lynch Waterson
Bevan J. Collins
Raghuram Vijapurapu
Marcus Andrew Whittington
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sentrybay Ltd
Original Assignee
Sentrybay Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sentrybay LtdfiledCriticalSentrybay Ltd
Priority to US12/989,006priorityCriticalpatent/US8806622B2/en
Assigned to SENTRYBAY LIMITEDreassignmentSENTRYBAY LIMITEDASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: COLLINS, BEVAN J., VIJAPURAPU, RAGHURAM, WATERSON, DAVID LYNCH, WHITTINGTON, MARCUS ANDREW
Publication of US20120023566A1publicationCriticalpatent/US20120023566A1/en
Application grantedgrantedCritical
Publication of US8806622B2publicationCriticalpatent/US8806622B2/en
Assigned to BLAZEHILL CAPITAL FINANCE LIMITEDreassignmentBLAZEHILL CAPITAL FINANCE LIMITEDSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: SENTRYBAY LIMITED
Assigned to BLAZEHILL CAPITAL FINANCE LIMITEDreassignmentBLAZEHILL CAPITAL FINANCE LIMITEDDEBENTURE AND GUARANTEEAssignors: SENTRYBAY HOLDINGS LIMITED, SENTRYBAY LIMITED
Assigned to SENTRYBAY LIMITED, SENTRYBAY HOLDINGS LIMITEDreassignmentSENTRYBAY LIMITEDRELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: BLAZEHILL CAPITAL FINANCE LIMITED
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method of determining whether a page is a fraudulent page comprising the steps of: extracting a plurality of tokens from the page, (403) for each token, calculating a token probability being the probability of the token being in a fraudulent page (404), using the calculated token probabilities, calculating a page probability being the probability of the page being a fraudulent page (405), wherein the token probability of a token being in a fraudulent page is calculated based on a number of fraudulent pages and a number of non-fraudulent pages which contain the token from a training corpus of fraudulent pages and non-fraudulent pages.

Description

Claims (24)

15. A method of determining whether a website page is a fraudulent page comprising:
obtaining text from the page,
extracting a first set of tokens from the text, and for each token from the first set calculating a token probability, being the probability of the token being in a fraudulent page,
determining a first page probability, being a probability that the page is a fraudulent page, from the token probabilities for the first set of tokens,
performing optical character recognition on an image of the page,
extracting a second set of tokens from the image of the page, and for each token from the second set calculating a token probability, being the probability of the token being in a fraudulent page,
determining a second page probability, being probability that the page is a fraudulent page, from the token probabilities for the second set of tokens.
US12/989,0062008-04-212009-04-21Fraudulent page detectionActive2030-07-28US8806622B2 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US12/989,006US8806622B2 (en)2008-04-212009-04-21Fraudulent page detection

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US4650208P2008-04-212008-04-21
PCT/NZ2009/000058WO2009131469A1 (en)2008-04-212009-04-21Fraudulent page detection
US12/989,006US8806622B2 (en)2008-04-212009-04-21Fraudulent page detection

Publications (2)

Publication NumberPublication Date
US20120023566A1true US20120023566A1 (en)2012-01-26
US8806622B2 US8806622B2 (en)2014-08-12

Family

ID=41217022

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US12/989,006Active2030-07-28US8806622B2 (en)2008-04-212009-04-21Fraudulent page detection

Country Status (3)

CountryLink
US (1)US8806622B2 (en)
EP (1)EP2283446A4 (en)
WO (1)WO2009131469A1 (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20120124671A1 (en)*2010-11-162012-05-17Booz, Allen & HamiltonSystems and methods for identifying and mitigating information security risks
US20130138427A1 (en)*2011-11-302013-05-30Match.Com, LpFraud Detection Using Text Analysis
WO2015066441A1 (en)*2013-10-312015-05-07Yeager F ScottSystem and method for controlling ad impression violations
US20150139539A1 (en)*2013-11-182015-05-21Electronics And Telecommunications Research InstituteApparatus and method for detecting forgery/falsification of homepage
US9053154B1 (en)*2012-09-202015-06-09Google Inc.System and method for generating a compatibility score for web content
US20150341381A1 (en)*2012-12-202015-11-26Foundation Of Soongsil University-Industry CooperationApparatus and method for collecting harmful website information
JP2016006700A (en)*2015-10-152016-01-14株式会社エヌ・ティ・ティ・データDelivery information analysis apparatus, delivery information analysis method, and delivery information analysis program
US9325730B2 (en)2013-02-082016-04-26PhishMe, Inc.Collaborative phishing attack detection
US9398038B2 (en)2013-02-082016-07-19PhishMe, Inc.Collaborative phishing attack detection
US20160352777A1 (en)*2014-11-172016-12-01Vade Retro Technology Inc.Methods and systems for phishing detection
US20160364555A1 (en)*2015-06-142016-12-15Guardtime Ip Holdings LimitedSystem and methods with assured one-time, replay-resistant passwords
USD780775S1 (en)2016-08-302017-03-07Tinder, Inc.Display screen or portion thereof with a graphical user interface of an electronic device
USD781311S1 (en)2016-08-302017-03-14Tinder, Inc.Display screen or portion thereof with a graphical user interface
USD781882S1 (en)2016-08-302017-03-21Tinder, Inc.Display screen or portion thereof with a graphical user interface of an electronic device
US9667645B1 (en)2013-02-082017-05-30PhishMe, Inc.Performance benchmarking for simulated phishing attacks
US20180052991A1 (en)*2013-12-042018-02-22Plentyoffish Media UlcApparatus, method and article to facilitate automatic detection and removal of fraudulent user information in a network environment
US9906539B2 (en)2015-04-102018-02-27PhishMe, Inc.Suspicious message processing and incident response
US10021133B1 (en)*2014-11-142018-07-10Ciphercloud, Inc.System and method for anti-phishing system
US20180198773A1 (en)*2013-03-152018-07-12Veracode, Inc.Systems and methods for automated detection of login sequence for web form-based authentication
USD852809S1 (en)2016-08-302019-07-02Match Group, LlcDisplay screen or portion thereof with a graphical user interface of an electronic device
USD854025S1 (en)2016-08-302019-07-16Match Group, LlcDisplay screen or portion thereof with a graphical user interface of an electronic device
US10404734B2 (en)*2016-07-072019-09-03International Business Machines CorporationRoot cause analysis in dynamic software testing via probabilistic modeling
US10540607B1 (en)2013-12-102020-01-21Plentyoffish Media UlcApparatus, method and article to effect electronic message reply rate matching in a network environment
US10769221B1 (en)2012-08-202020-09-08Plentyoffish Media UlcApparatus, method and article to facilitate matching of clients in a networked environment
US11175808B2 (en)2013-07-232021-11-16Plentyoffish Media UlcApparatus, method and article to facilitate matching of clients in a networked environment
US20210382993A1 (en)*2018-05-102021-12-09Endgame Systems, Inc.System and Method for Detecting a Malicious File
US11568008B2 (en)2013-03-132023-01-31Plentyoffish Media UlcApparatus, method and article to identify discrepancies between clients and in response prompt clients in a networked environment

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8769695B2 (en)2009-04-302014-07-01Bank Of America CorporationPhish probability scoring model
CN103810425B (en)2012-11-132015-09-30腾讯科技(深圳)有限公司The detection method of malice network address and device
US10489779B2 (en)*2013-10-212019-11-26Visa International Service AssociationMulti-network token bin routing with defined verification parameters
US9521164B1 (en)*2014-01-152016-12-13Frank AngiolelliComputerized system and method for detecting fraudulent or malicious enterprises
US10291628B2 (en)*2014-11-072019-05-14International Business Machines CorporationCognitive detection of malicious documents
US11522887B2 (en)*2018-02-202022-12-06Darktrace Holdings LimitedArtificial intelligence controller orchestrating network components for a cyber threat defense
US11411992B2 (en)2019-11-072022-08-09Mcafee, LlcVisual detection of phishing websites via headless browser
JP7533624B2 (en)*2020-12-162024-08-14日本電信電話株式会社 Classification device, classification method, and classification program
US12401687B2 (en)*2023-04-282025-08-26Mcafee, LlcPhishing detection via grammatical artifacts

Citations (23)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030065926A1 (en)*2001-07-302003-04-03Schultz Matthew G.System and methods for detection of new malicious executables
US20060090073A1 (en)*2004-04-272006-04-27Shira SteinbergSystem and method of using human friendly representations of mathematical values and activity analysis to confirm authenticity
US20060095524A1 (en)*2004-10-072006-05-04Kay Erik ASystem, method, and computer program product for filtering messages
US20060123478A1 (en)*2004-12-022006-06-08Microsoft CorporationPhishing detection, prevention, and notification
US20060212930A1 (en)*2005-03-022006-09-21Markmonitor, Inc.Distribution of trust data
US20060253580A1 (en)*2005-05-032006-11-09Dixon Christopher JWebsite reputation product architecture
US20070039038A1 (en)*2004-12-022007-02-15Microsoft CorporationPhishing Detection, Prevention, and Notification
US20070107053A1 (en)*2004-05-022007-05-10Markmonitor, Inc.Enhanced responses to online fraud
US20070239999A1 (en)*2002-01-252007-10-11Andrew HonigSystems and methods for adaptive model generation for detecting intrusions in computer systems
US20080046738A1 (en)*2006-08-042008-02-21Yahoo! Inc.Anti-phishing agent
US20080092242A1 (en)*2006-10-162008-04-17Red Hat, Inc.Method and system for determining a probability of entry of a counterfeit domain in a browser
US20080131006A1 (en)*2006-12-042008-06-05Jonathan James OliverPure adversarial approach for identifying text content in images
US20080133540A1 (en)*2006-12-012008-06-05Websense, Inc.System and method of analyzing web addresses
US20080141376A1 (en)*2006-10-242008-06-12Pc Tools Technology Pty Ltd.Determining maliciousness of software
US20080184371A1 (en)*2007-01-292008-07-31Deutsche Telekom Ag method and system for detecting malicious behavioral patterns in a computer, using machine learning
US20090094669A1 (en)*2007-10-052009-04-09Subex Azure LimitedDetecting fraud in a communications network
US7523016B1 (en)*2006-12-292009-04-21Google Inc.Detecting anomalies
US20090157675A1 (en)*2007-12-142009-06-18Bank Of America CorporationMethod and System for Processing Fraud Notifications
US20090222243A1 (en)*2008-02-292009-09-03Zoldi Scott MAdaptive Analytics
US20100049975A1 (en)*2006-12-012010-02-25Bryan ParnoMethod and apparatus for secure online transactions
US7802298B1 (en)*2006-08-102010-09-21Trend Micro IncorporatedMethods and apparatus for protecting computers against phishing attacks
US7925044B2 (en)*2006-02-012011-04-12Markmonitor Inc.Detecting online abuse in images
US8205255B2 (en)*2007-05-142012-06-19Cisco Technology, Inc.Anti-content spoofing (ACS)

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7457823B2 (en)2004-05-022008-11-25Markmonitor Inc.Methods and systems for analyzing data related to possible online fraud
US7870608B2 (en)2004-05-022011-01-11Markmonitor, Inc.Early detection and monitoring of online fraud
US8769671B2 (en)2004-05-022014-07-01Markmonitor Inc.Online fraud solution
US8041769B2 (en)2004-05-022011-10-18Markmonitor Inc.Generating phish messages
US20070299915A1 (en)2004-05-022007-12-27Markmonitor, Inc.Customer-based detection of online fraud
US7913302B2 (en)2004-05-022011-03-22Markmonitor, Inc.Advanced responses to online fraud
US7992204B2 (en)2004-05-022011-08-02Markmonitor, Inc.Enhanced responses to online fraud
US9203648B2 (en)2004-05-022015-12-01Thomson Reuters Global ResourcesOnline fraud solution
US20070094500A1 (en)2005-10-202007-04-26Marvin ShannonSystem and Method for Investigating Phishing Web Sites
WO2006042480A2 (en)2004-10-222006-04-27Metaswarm (Hongkong) Ltd.System and method for investigating phishing web sites
US7831915B2 (en)*2005-11-102010-11-09Microsoft CorporationDynamically protecting against web resources associated with undesirable activities
JP2007139864A (en)*2005-11-152007-06-07Nec CorpApparatus and method for detecting suspicious conversation, and communication device using the same
US8839418B2 (en)2006-01-182014-09-16Microsoft CorporationFinding phishing sites
CN101155182A (en)*2006-09-302008-04-02阿里巴巴公司Garbage information filtering method and apparatus based on network
KR20070067651A (en)*2007-05-092007-06-28한재호 How to prevent phishing by analyzing Internet site patterns

Patent Citations (23)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030065926A1 (en)*2001-07-302003-04-03Schultz Matthew G.System and methods for detection of new malicious executables
US20070239999A1 (en)*2002-01-252007-10-11Andrew HonigSystems and methods for adaptive model generation for detecting intrusions in computer systems
US20060090073A1 (en)*2004-04-272006-04-27Shira SteinbergSystem and method of using human friendly representations of mathematical values and activity analysis to confirm authenticity
US20070107053A1 (en)*2004-05-022007-05-10Markmonitor, Inc.Enhanced responses to online fraud
US20060095524A1 (en)*2004-10-072006-05-04Kay Erik ASystem, method, and computer program product for filtering messages
US20060123478A1 (en)*2004-12-022006-06-08Microsoft CorporationPhishing detection, prevention, and notification
US20070039038A1 (en)*2004-12-022007-02-15Microsoft CorporationPhishing Detection, Prevention, and Notification
US20060212930A1 (en)*2005-03-022006-09-21Markmonitor, Inc.Distribution of trust data
US20060253580A1 (en)*2005-05-032006-11-09Dixon Christopher JWebsite reputation product architecture
US7925044B2 (en)*2006-02-012011-04-12Markmonitor Inc.Detecting online abuse in images
US20080046738A1 (en)*2006-08-042008-02-21Yahoo! Inc.Anti-phishing agent
US7802298B1 (en)*2006-08-102010-09-21Trend Micro IncorporatedMethods and apparatus for protecting computers against phishing attacks
US20080092242A1 (en)*2006-10-162008-04-17Red Hat, Inc.Method and system for determining a probability of entry of a counterfeit domain in a browser
US20080141376A1 (en)*2006-10-242008-06-12Pc Tools Technology Pty Ltd.Determining maliciousness of software
US20100049975A1 (en)*2006-12-012010-02-25Bryan ParnoMethod and apparatus for secure online transactions
US20080133540A1 (en)*2006-12-012008-06-05Websense, Inc.System and method of analyzing web addresses
US20080131006A1 (en)*2006-12-042008-06-05Jonathan James OliverPure adversarial approach for identifying text content in images
US7523016B1 (en)*2006-12-292009-04-21Google Inc.Detecting anomalies
US20080184371A1 (en)*2007-01-292008-07-31Deutsche Telekom Ag method and system for detecting malicious behavioral patterns in a computer, using machine learning
US8205255B2 (en)*2007-05-142012-06-19Cisco Technology, Inc.Anti-content spoofing (ACS)
US20090094669A1 (en)*2007-10-052009-04-09Subex Azure LimitedDetecting fraud in a communications network
US20090157675A1 (en)*2007-12-142009-06-18Bank Of America CorporationMethod and System for Processing Fraud Notifications
US20090222243A1 (en)*2008-02-292009-09-03Zoldi Scott MAdaptive Analytics

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Garera S., Provos N., Chew M., Rubin A. D. "A framework for detection and measurement of phishing attacks", Proceedings of the ACM Workshop on Recurring Malcode (WORM), 2007, 8 pages*
Saberi A., Vahidi M., Behrouz M. B. "Learn to detect phishing scams using Learning and Ensemble Methods", IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology- Workshops, 2007, pages 311-314*

Cited By (53)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20120124671A1 (en)*2010-11-162012-05-17Booz, Allen & HamiltonSystems and methods for identifying and mitigating information security risks
US8793799B2 (en)*2010-11-162014-07-29Booz, Allen & HamiltonSystems and methods for identifying and mitigating information security risks
US20140337995A1 (en)*2010-11-162014-11-13Booz, Allen & HamiltonSystems and method for identifying and mitigating information security risks
US9270696B2 (en)*2010-11-162016-02-23Booz Allen Hamilton Inc.Systems and method for identifying and mitigating information security risks
US20130138427A1 (en)*2011-11-302013-05-30Match.Com, LpFraud Detection Using Text Analysis
US8862461B2 (en)*2011-11-302014-10-14Match.Com, LpFraud detection using text analysis
US20150095019A1 (en)*2011-11-302015-04-02Match.Com, L.L.C.Fraud detection using text analysis
US9418057B2 (en)*2011-11-302016-08-16Match.Com, L.L.CFraud detection using text analysis
US11908001B2 (en)2012-08-202024-02-20Plentyoffish Media UlcApparatus, method and article to facilitate matching of clients in a networked environment
US10769221B1 (en)2012-08-202020-09-08Plentyoffish Media UlcApparatus, method and article to facilitate matching of clients in a networked environment
US9053154B1 (en)*2012-09-202015-06-09Google Inc.System and method for generating a compatibility score for web content
US20150341381A1 (en)*2012-12-202015-11-26Foundation Of Soongsil University-Industry CooperationApparatus and method for collecting harmful website information
US9749352B2 (en)*2012-12-202017-08-29Foundation Of Soongsil University-Industry CooperationApparatus and method for collecting harmful website information
US10819744B1 (en)2013-02-082020-10-27Cofense IncCollaborative phishing attack detection
US9356948B2 (en)2013-02-082016-05-31PhishMe, Inc.Collaborative phishing attack detection
US9398038B2 (en)2013-02-082016-07-19PhishMe, Inc.Collaborative phishing attack detection
US9325730B2 (en)2013-02-082016-04-26PhishMe, Inc.Collaborative phishing attack detection
US9667645B1 (en)2013-02-082017-05-30PhishMe, Inc.Performance benchmarking for simulated phishing attacks
US10187407B1 (en)2013-02-082019-01-22Cofense Inc.Collaborative phishing attack detection
US9591017B1 (en)2013-02-082017-03-07PhishMe, Inc.Collaborative phishing attack detection
US9674221B1 (en)2013-02-082017-06-06PhishMe, Inc.Collaborative phishing attack detection
US11568008B2 (en)2013-03-132023-01-31Plentyoffish Media UlcApparatus, method and article to identify discrepancies between clients and in response prompt clients in a networked environment
US10587612B2 (en)*2013-03-152020-03-10Veracode, Inc.Automated detection of login sequence for web form-based authentication
US20180198773A1 (en)*2013-03-152018-07-12Veracode, Inc.Systems and methods for automated detection of login sequence for web form-based authentication
US11747971B2 (en)2013-07-232023-09-05Plentyoffish Media UlcApparatus, method and article to facilitate matching of clients in a networked environment
US11175808B2 (en)2013-07-232021-11-16Plentyoffish Media UlcApparatus, method and article to facilitate matching of clients in a networked environment
WO2015066441A1 (en)*2013-10-312015-05-07Yeager F ScottSystem and method for controlling ad impression violations
US20150139539A1 (en)*2013-11-182015-05-21Electronics And Telecommunications Research InstituteApparatus and method for detecting forgery/falsification of homepage
US9323987B2 (en)*2013-11-182016-04-26Electronics And Telecommunications Research InstituteApparatus and method for detecting forgery/falsification of homepage
US20180052991A1 (en)*2013-12-042018-02-22Plentyoffish Media UlcApparatus, method and article to facilitate automatic detection and removal of fraudulent user information in a network environment
US11546433B2 (en)2013-12-042023-01-03Plentyoffish Media UlcApparatus, method and article to facilitate automatic detection and removal of fraudulent user information in a network environment
US11949747B2 (en)2013-12-042024-04-02Plentyoffish Media UlcApparatus, method and article to facilitate automatic detection and removal of fraudulent user information in a network environment
US12373552B2 (en)2013-12-042025-07-29Plentyoffish Media UlcApparatus, method and article to facilitate automatic detection and removal of fraudulent user information in a network environment
US10637959B2 (en)*2013-12-042020-04-28Plentyoffish Media UlcApparatus, method and article to facilitate automatic detection and removal of fraudulent user information in a network environment
US10540607B1 (en)2013-12-102020-01-21Plentyoffish Media UlcApparatus, method and article to effect electronic message reply rate matching in a network environment
US10021133B1 (en)*2014-11-142018-07-10Ciphercloud, Inc.System and method for anti-phishing system
US10021134B2 (en)*2014-11-172018-07-10Vade Secure Technology, Inc.Methods and systems for phishing detection
US20160352777A1 (en)*2014-11-172016-12-01Vade Retro Technology Inc.Methods and systems for phishing detection
US9906539B2 (en)2015-04-102018-02-27PhishMe, Inc.Suspicious message processing and incident response
US9906554B2 (en)2015-04-102018-02-27PhishMe, Inc.Suspicious message processing and incident response
US20160364555A1 (en)*2015-06-142016-12-15Guardtime Ip Holdings LimitedSystem and methods with assured one-time, replay-resistant passwords
US9697340B2 (en)*2015-06-142017-07-04Guardtime IP Holdings, Ltd.System and methods with assured one-time, replay-resistant passwords
JP2016006700A (en)*2015-10-152016-01-14株式会社エヌ・ティ・ティ・データDelivery information analysis apparatus, delivery information analysis method, and delivery information analysis program
US11418535B2 (en)2016-07-072022-08-16International Business Machines CorporationRoot cause analysis in dynamic software testing via probabilistic modeling
US10404734B2 (en)*2016-07-072019-09-03International Business Machines CorporationRoot cause analysis in dynamic software testing via probabilistic modeling
US10887336B2 (en)2016-07-072021-01-05International Business Machines CorporationRoot cause analysis in dynamic software testing via probabilistic modeling
USD781882S1 (en)2016-08-302017-03-21Tinder, Inc.Display screen or portion thereof with a graphical user interface of an electronic device
USD852809S1 (en)2016-08-302019-07-02Match Group, LlcDisplay screen or portion thereof with a graphical user interface of an electronic device
USD780775S1 (en)2016-08-302017-03-07Tinder, Inc.Display screen or portion thereof with a graphical user interface of an electronic device
USD854025S1 (en)2016-08-302019-07-16Match Group, LlcDisplay screen or portion thereof with a graphical user interface of an electronic device
USD781311S1 (en)2016-08-302017-03-14Tinder, Inc.Display screen or portion thereof with a graphical user interface
US20210382993A1 (en)*2018-05-102021-12-09Endgame Systems, Inc.System and Method for Detecting a Malicious File
US11809556B2 (en)*2018-05-102023-11-07Endgame Systems, Inc.System and method for detecting a malicious file

Also Published As

Publication numberPublication date
WO2009131469A1 (en)2009-10-29
EP2283446A4 (en)2012-09-05
US8806622B2 (en)2014-08-12
EP2283446A1 (en)2011-02-16

Similar Documents

PublicationPublication DateTitle
US8806622B2 (en)Fraudulent page detection
Sheng et al.An empirical analysis of phishing blacklists
RU2607229C2 (en)Systems and methods of dynamic indicators aggregation to detect network fraud
US8850567B1 (en)Unauthorized URL requests detection
US9032085B1 (en)Identifying use of software applications
US8826155B2 (en)System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface
US8516377B2 (en)Indicating Website reputations during Website manipulation of user information
US9384345B2 (en)Providing alternative web content based on website reputation assessment
US7822620B2 (en)Determining website reputations using automatic testing
US7765481B2 (en)Indicating website reputations during an electronic commerce transaction
US8566726B2 (en)Indicating website reputations based on website handling of personal information
CA2854966C (en)Fraud analyst smart cookie
Vasek et al.The bitcoin brain drain: Examining the use and abuse of bitcoin brain wallets
US20060253584A1 (en)Reputation of an entity associated with a content item
Wondracek et al.Is the Internet for Porn? An Insight Into the Online Adult Industry.
WO2006119481A2 (en)Indicating website reputations within search results
Hajgude et al.Phish mail guard: Phishing mail detection technique by using textual and URL analysis
WO2005091107A1 (en)Security component for use with an internet browser application and method and apparatus associated therewith
US20060179005A1 (en)Network security system and methods regarding the same
Prem et al.Phishing and anti-phishing techniques
Gautam et al.Phishing prevention techniques: past, present and future
Nosyk et al.Exposing the Roots of DNS Abuse: A Data-Driven Analysis of Key Factors Behind Phishing Domain Reg-istrations
WattersAttack Attribution
Efe-odenema et al.Webpage Classification for Detecting Phishing Attack
JP2021093010A (en)Reliability evaluation device, reliability evaluation method, and reliability evaluation program

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:SENTRYBAY LIMITED, UNITED KINGDOM

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WATERSON, DAVID LYNCH;COLLINS, BEVAN J.;VIJAPURAPU, RAGHURAM;AND OTHERS;SIGNING DATES FROM 20101210 TO 20101219;REEL/FRAME:025653/0768

STCFInformation on status: patent grant

Free format text:PATENTED CASE

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551)

Year of fee payment:4

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2552); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

Year of fee payment:8

ASAssignment

Owner name:BLAZEHILL CAPITAL FINANCE LIMITED, UNITED KINGDOM

Free format text:SECURITY INTEREST;ASSIGNOR:SENTRYBAY LIMITED;REEL/FRAME:061019/0956

Effective date:20220902

ASAssignment

Owner name:BLAZEHILL CAPITAL FINANCE LIMITED, UNITED KINGDOM

Free format text:DEBENTURE AND GUARANTEE;ASSIGNORS:SENTRYBAY LIMITED;SENTRYBAY HOLDINGS LIMITED;REEL/FRAME:063991/0604

Effective date:20230530

ASAssignment

Owner name:SENTRYBAY HOLDINGS LIMITED, UNITED KINGDOM

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:BLAZEHILL CAPITAL FINANCE LIMITED;REEL/FRAME:066297/0895

Effective date:20240126

Owner name:SENTRYBAY LIMITED, UNITED KINGDOM

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:BLAZEHILL CAPITAL FINANCE LIMITED;REEL/FRAME:066297/0895

Effective date:20240126


[8]ページ先頭

©2009-2025 Movatter.jp